diff --git a/docs/usage/configuration-options.md b/docs/usage/configuration-options.md index ae100f64ef2d86dab2c3a12b79b545a4bee0a7d3..1c09574c85897a342701ff7b2d7a6c2f4dbac249 100644 --- a/docs/usage/configuration-options.md +++ b/docs/usage/configuration-options.md @@ -114,7 +114,7 @@ Must be valid usernames on the platform in use. If enabled Renovate will try to determine PR assignees by matching rules defined in a CODEOWNERS file against the changes in the PR. -See [GitHub](https://help.github.com/en/github/creating-cloning-and-archiving-repositories/about-code-owners) or [GitLab](https://docs.gitlab.com/ee/user/project/code_owners.html) documentation for details on syntax and possible file locations. +See [GitHub](https://docs.github.com/en/repositories/managing-your-repositorys-settings-and-features/customizing-your-repository/about-code-owners) or [GitLab](https://docs.gitlab.com/ee/user/project/code_owners.html) documentation for details on syntax and possible file locations. ## assigneesSampleSize @@ -772,7 +772,7 @@ Also, approval rules overriding should not be [prevented in GitLab settings](htt Configuration added here applies for all Go-related updates, however currently the only supported package manager for Go is the native Go Modules (the `gomod` manager). -For self-hosted users, `GOPROXY`, `GONOPROXY` and `GOPRIVATE` environment variables are supported ([reference](https://golang.org/ref/mod#module-proxy)). +For self-hosted users, `GOPROXY`, `GONOPROXY` and `GOPRIVATE` environment variables are supported ([reference](https://go.dev/ref/mod#module-proxy)). Usage of `direct` will fallback to the Renovate-native release fetching mechanism. Also we support the `off` keyword which will stop any fetching immediately. @@ -2606,7 +2606,7 @@ Other managers can use the `"loose"` versioning fallback: the first 3 parts are ## vulnerabilityAlerts Renovate can read from GitHub's Vulnerability Alerts and customize Pull Requests accordingly. -For this to work, you must first ensure you have enabled "[Dependency graph](https://docs.github.com/en/code-security/supply-chain-security/about-the-dependency-graph#enabling-the-dependency-graph)" and "[Dependabot alerts](https://docs.github.com/en/github/administering-a-repository/managing-security-and-analysis-settings-for-your-repository)" under the "Security & analysis" section of the repository's "Settings" tab. +For this to work, you must first ensure you have enabled "[Dependency graph](https://docs.github.com/en/code-security/supply-chain-security/understanding-your-software-supply-chain/about-the-dependency-graph#enabling-the-dependency-graph)" and "[Dependabot alerts](https://docs.github.com/en/repositories/managing-your-repositorys-settings-and-features/enabling-features-for-your-repository/managing-security-and-analysis-settings-for-your-repository)" under the "Security & analysis" section of the repository's "Settings" tab. Additionally, if you are running Renovate in app mode then you must make sure that the app has been granted the permissions to read "Vulnerability alerts". If you are the account admin, browse to the app (e.g. [https://github.com/apps/renovate](https://github.com/apps/renovate)), select "Configure", and then scroll down to the "Permissions" section and verify that read access to "vulnerability alerts" is mentioned.